We're giving away free "Phisher" account upgrades to new members who register now!

The Rise and Fall of IoT Botnets
#1
From 2013 to 2020, the internet experienced what could be called the Golden Age of IoT botnet chaos. Botnets like Mirai, Bashlite, and Aidra took advantage of the explosion in poorly secured Internet of Things (IoT) devices—exploiting default credentials, unpatched firmware, and careless user behavior to build massive networks of hijacked routers, IP cameras, DVRs, and even smart fridges. These compromised devices were turned into digital weapons, capable of launching large-scale attacks that reshaped the landscape of cyberwarfare. One of the most infamous examples was Mirai’s 2016 attack on DNS provider Dyn, which brought down major platforms like Twitter, Netflix, and Reddit with a 1.2 Tbps distributed denial-of-service (DDoS) assault. This incident served as a wake-up call to the world: IoT security was dangerously inadequate, and cybercriminals were profiting from it. At its peak, Mirai infected over 600,000 devices, exposing how vulnerable the backbone of the internet truly was.

The dominance of IoT botnets during this period was fueled by several factors. First, the low-hanging fruit of unsecured devices made them easy targets. Default usernames and passwords like “admin:admin” and open Telnet ports meant that attackers could compromise devices simply by scanning IP ranges. Second, the sheer scale of IoT proliferation played a critical role. By 2020, there were over 20 billion IoT devices connected to the internet, many of which were never patched or updated—giving botnets a virtually unlimited pool of potential recruits. Third, profit became a major motivator. Botnets evolved into a service industry, with offerings like “Mirai as a Service” allowing even unskilled users to launch DDoS attacks for as little as $19.99 a month.

However, the era of unchecked IoT botnet growth eventually came to an end due to a combination of law enforcement, vigilante malware, and improved security practices. Authorities arrested the original creators of Mirai in 2017, although the botnet's source code had already been made public, leading to numerous variants. Meanwhile, vigilante efforts emerged in the form of malware like Hajime and BrickerBot, which actively sought to disable infected devices to prevent them from being used in more harmful attacks. Additionally, ISPs and manufacturers began to implement mandatory firmware updates and improve default security settings, while regulatory pressure further encouraged better cybersecurity practices across the industry.

Although the original wave of IoT botnets has subsided, the threat has not disappeared—it has evolved. Modern botnets like Mozi and DarkNexus now target enterprise-level hardware and hide their command-and-control infrastructure behind peer-to-peer networks, making them harder to detect and shut down. While the chaotic, wide-open days of IoT exploitation may be over, today’s threats are stealthier and more sophisticated. 

The question remains: did IoT botnets truly peak in 2016, or are we simply entering a new, smarter phase of cyber warfare?
Reply
#2
I think IoT botnets will survive but it will not popular. Anyway there is a lot of backdoors from manufacturer in firmwares, Kernels for IoT devices don't have memory protections to make it faster and etc.
It will be just harder to hack IoT's for botnets but it will survive.
Reply
#3
(06-19-2025, 03:57 PM)L3cter Wrote: I think IoT botnets will survive but it will not popular. Anyway there is a lot of backdoors from manufacturer in firmwares, Kernels for IoT devices don't have memory protections to make it faster and etc.
It will be just harder to hack IoT's for botnets but it will survive.

Yes, I agree with this. There will be a fair amount of IoT devices but not as popular as there will be a challenge to manage those IoT devices. Unmanaged IoT devices can then become a threat.
Reply
#4
(06-19-2025, 06:09 PM)Kingpin Wrote:
(06-19-2025, 03:57 PM)L3cter Wrote: I think IoT botnets will survive but it will not popular. Anyway there is a lot of backdoors from manufacturer in firmwares, Kernels for IoT devices don't have memory protections to make it faster and etc.
It will be just harder to hack IoT's for botnets but it will survive.

Yes, I agree with this. There will be a fair amount of IoT devices but not as popular as there will be a challenge to manage those IoT devices. Unmanaged IoT devices can then become a threat.

I think I've seen a few reports of APT attacks where they gained access to the network by first hacking into a Hikvision IP camera. I think this is common practice when you know internal details about a company. After that, pivoting and sniffing will be much easier and anonymous.
Reply


Forum Jump: